Exam 9: Managing Multiuser Databases

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An exclusive lock locks the item from change but not from read access.

(True/False)
4.9/5
(32)

A passive data repository is preferred over an active repository because it requires less human intervention.

(True/False)
4.8/5
(29)

Processing responsibilities should be documented and encoded into manual procedures.

(True/False)
4.9/5
(38)

A dirty read happens when one transaction reads a changed record that has not been committed to the database.

(True/False)
4.7/5
(36)

In two-phase locking,all locks are obtained during the growing phase.

(True/False)
4.9/5
(31)

In general,the overall responsibility of the DBA is to facilitate the development and use of the database system.

(True/False)
4.9/5
(37)

Locks that are placed assuming that a conflict will occur are called:

(Multiple Choice)
4.8/5
(35)

An active data repository is one in which the metadata is automatically created as the system components are created.

(True/False)
4.8/5
(35)

Which of the following is allowed by "Repeatable Read Isolation"?

(Multiple Choice)
4.7/5
(34)

Changes in the database structure usually involve only one application.

(True/False)
4.9/5
(33)

A durable transaction is one for which all committed changes are permanent.

(True/False)
4.8/5
(31)

What are objects,and how are they related to the object-oriented DBMS (OODBMS)?

(Essay)
4.7/5
(31)

Which of the following cannot be enforced in the DBMS or application programs?

(Multiple Choice)
4.9/5
(27)

The task of diagnosing errors due to changes in the database structure is eased by:

(Multiple Choice)
5.0/5
(32)

A "database save" is used to mark the end of a transaction.

(True/False)
4.8/5
(39)

Which of the following is not true of DBMS security features?

(Multiple Choice)
4.9/5
(27)

A transaction is a series of actions to be taken on the database such that either all of them are performed successfully or none of them is performed at all.

(True/False)
4.9/5
(37)

Recovering a database via reprocessing involves:

(Multiple Choice)
4.7/5
(40)

The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times.

(True/False)
4.8/5
(32)

Explain the process of using optimistic locking.

(Essay)
4.9/5
(32)
Showing 61 - 80 of 102
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)